Sweetening Your Threat Intelligence with Automated Honeypots

Thumbnail Image
Can’t use the file because of accessibility barriers? Contact us

Date

2018-06-28

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

Many organizations currently deploy honeypots within their networks to generate actionable threat intelligence. However, the process of deploying numerous honeypots across a network can require a significant amount of setup and configuration. We will present a method for dynamically and automatically deploying honeypots using Docker and Ansible, as well as deployment techniques for several popular cloud providers. By using these techniques to deploy honeypots, organizations can rapidly and easily enhance their current threat intelligence.

Description

Keywords

Cybersecurity, Honeypot, Threat Intelligence

Citation

Journal

DOI

Link(s) to data and video for this item

Relation

Rights

Type

Presentation